Sciweavers

2000 search results - page 115 / 400
» Program Transformation and Proof Transformation
Sort
View
121
Voted
ICASSP
2011
IEEE
14 years 7 months ago
A general proof of convergence for adaptive distributed beamforming schemes
This work focuses on the convergence analysis of adaptive distributed beamforming schemes that can be reformulated as local random search algorithms via a random search framework....
Chang-Ching Chen, Chia-Shiang Tseng, Che Lin
133
Voted
IMA
2005
Springer
126views Cryptology» more  IMA 2005»
15 years 9 months ago
Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme
Abstract. Identity-based encryption (IBE) is a special asymmetric encryption method where a public encryption key can be an arbitrary identifier and the corresponding private decr...
Liqun Chen, Zhaohui Cheng
EKAW
2006
Springer
15 years 7 months ago
From Natural Language to Formal Proof Goal
Guidelines (Extended abstract) Ruud Stegers1 , Annette ten Teije1 , and Frank van Harmelen1 Vrije Universiteit, Amsterdam The main problem encountered when starting verification of...
Ruud Stegers, Annette ten Teije, Frank van Harmele...
APLAS
2009
ACM
15 years 10 months ago
A Short Cut to Optimal Sequences
We propose a method for easily developing efficient programs for finding optimal sequences, such as the maximum weighted sequence of a set of feasible ones. We formalize a way to ...
Akimasa Morihata
131
Voted
IPPS
2007
IEEE
15 years 9 months ago
Scheduling in the Z-Polyhedral Model
The polyhedral model is extensively used for analyses and transformations of regular loop programs, one of the most important being automatic parallelization. The model, however, ...
Gautam Gupta, DaeGon Kim, Sanjay V. Rajopadhye